Cyber Security Montreal Secure Server Encrypted Data

Home » Blog » LibreWolf is designed to increase protection
LibreWolf A fork of Firefox, focused on privacy, security and freedom.

LibreWolf can be your next best friend!?
Web browsers become more a "BrowserOS", and this is a significant issue with your online privacy.

This project is an independent fork of #Firefox, with the primary goals of #privacy, #security and user freedom.

LibreWolf is designed to increase protection against tracking and fingerprinting techniques, while also including a few security improvements. This is achieved through our privacy and security oriented settings and patches. LibreWolf also aims to remove all the telemetry, data collection and annoyances, as well as disabling anti-freedom features like DRM.

Full features are:

Privacy area

  • Delete cookies and wesbites data on close.
  • Include only privacy respecting search engines like DuckDuckGo and Searx.
  • Include uBlockOrigin with custom default filter lists, and Tracking Protection in strict mode, to block trackers and ads.
  • Strip tracking elements from URLs, both natively and through uBO.
  • Enable dFPI, also known as Total Cookie Protection.
  • Enable RFP which is part of the Tor Uplift project. RFP is considered the best in class anti-fingerprinting solution, and it's goal is to make users look the same and cover as many metrics as possible, in an effort to block fingerprinting techniques.
  • Always display user language as en-US to websites, in order to protect the language used in the browser and in the OS.
  • Disable WebGL, as it is a strong fingerprinting vector.
  • Prevent access to the location services of the OS, and use Mozilla's location API instead of Google's API.
  • Protect the private IP address of the user when WebRTC is used. Limit ICE candidates generation to the default interface when sharing video or audio during a videoconference.
  • Force DNS and WebRTC inside the proxy, when one is being used.
  • Disable IPv6, as not all Linux distros ship with the Privacy Extension enabled by default.
  • Trim cross-origin referrers, so that they don't include the full URI.
  • Disable browsing, search and form history.
  • Disable form autofill.
  • Disable link prefetching and speculative connections.
  • Isolate service workers.
  • Disable disk cache and clear temporary files on close.
  • Disable OCSP, and instead use CRL, as it is a more robust and privacy respecting certificate revocation mechanism.

Security area

  • Stay up to date with upstream Firefox releases, in order to timely apply security patches.
  • Enable HTTPS-only mode.
  • Enable stricter negotiation rules for TLS/SSL.
  • Disable SHA-1 certificates.
  • Always force user interaction when deciding the download location of a file.
  • Disable scripting in the built in pdf reader.
  • Protect against IDN homograph attack.
  • Implement optional extension firewall, which can be enabled manually.

Annoyances area

  • Block pop-up windows and prevent window resizing from scripts.
  • Disable autoplay of media.
  • Disable search suggestions and ads in the urlbar.
  • Remove all the distracting and sponsored content from the home page.
  • Remove the Pocket extension at compile time.
  • Remove Mozilla VPN ads.
  • Disable Firefox accounts and Firefox Sync.
  • Disable extension recommendations.

Others

  • Completely open source and community driven.
  • Completely disable telemetry, including crash report, normandy, studies and personalized recommendations.
  • No data collection of any kind. In fact, as stated in our privacy policy, we wouldn't even have the infrastructure to do that, making it impossible from a technical standpoint.
  • Disable Google Safe Browsing, over censorship concerns, and in an effort to prevent Google from controlling another aspect of the internet.
  • Disable DRM, as it is a limitation to user freedom.
  • Avoid making unnecessary changes that increase the fingerprint without giving any privacy gain.
  • Only allow outgoing connections that are not privacy invading.
  • Disable built-in password manager and suggest more robust options.

Bonus tips
Please add those on your "/etc/hosts" file:

addons.cdn.mozilla.net
server-13-33-240-122.hel50.r.cloudfront.net
ec2-34-253-97-22.eu-west-1.compute.amazonaws.com
content-signature-2.cdn.mozilla.net
rt4bb146-89-147.routit.net
invidio.us
static.213-133-100-23.clients.your-server.de
132.145.233.26
52.142.124.215
167.99.237.63
194.187.168.100

Let's start your project

Let's create together your web solutions and build the best
user experience. Let's reach new levels with a new website,
the best onsite seo strategy and make the best conversion rate
on your ecommerce solution.
Alain Picard IT - Secure Server Montreal WordPress Magento
© 2022 alainpicard.ca - All rights reserved.
crossmenu linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram